-
-
Notifications
You must be signed in to change notification settings - Fork 15
/
Copy pathmkdocs.yml
65 lines (59 loc) · 3.16 KB
/
mkdocs.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
site_name: CSSLP-IN-BULLET-POINTS
nav:
- 'Home': 'README.md'
- 'Secure Software Concepts':
- 'General Security Concepts': '01-Secure-Software-Concepts/01-General-Security-Concepts.md'
- 'Risk Management': '01-Secure-Software-Concepts/02-Risk-Management.md'
- 'Security Policies and Regulations': '01-Secure-Software-Concepts/03-Security-Policies-and-Regulations.md'
- 'Software Development Methodologies': '01-Secure-Software-Concepts/04-Software-Development-Methodologies.md'
- 'Secure Software Requirements':
- 'Policy Decomposition': '02-Secure-Software-Requirements/01-Policy-Decomposition.md'
- 'Data Classification and Categorization': '02-Secure-Software-Requirements/02-Data-Classification-and-Categorization.md'
- 'Requirements': '02-Secure-Software-Requirements/03-Requirements.md'
- 'Secure Software Design':
- 'Design Processes': '03-Secure-Software-Design/01-Design-Processes.md'
- 'Design Considerations': '03-Secure-Software-Design/02-Design-Considerations.md'
- 'Securing Commonly Used Architecture': '03-Secure-Software-Design/03-Securing-Commonly-Used-Architecture.md'
- 'Technologies': '03-Secure-Software-Design/04-Technologies.md'
- 'Secure Software Implementation/Programming':
- 'Common Software Vulnerabilities and Countermeasures': '04-Secure-Software-Implementation-Programming/01-Common-Software-Vulnerabilities-and-Countermeasures.md'
- 'Defensive Coding Practices': '04-Secure-Software-Implementation-Programming/02-Defensive-Coding-Practices.md'
- 'Secure Software Coding Operations': '04-Secure-Software-Implementation-Programming/03-Secure-Software-Coding-Operations.md'
- 'Secure Software Testing':
- 'Security Quality Assurance Testing': '05-Secure-Software-Testing/01-Security-Quality-Assurance-Testing.md'
- 'Security Testing': '05-Secure-Software-Testing/02-Security-Testing.md'
- 'Secure Lifecycle Management':
- 'General Security Concepts': '06-Secure-Lifecycle-Management/01-Secure-Lifecycle-Management.md'
- 'Software Deployment, Operations, and Maintenance':
- 'Secure Software Installation and Deployment': '07-Software-Deployment-Operations-Maintenance/01-Secure-Software-Installation-and-Deployment.md'
- 'Secure Software Operations and Maintenance': '07-Software-Deployment-Operations-Maintenance/02-Secure-Software-Operations-and-Maintenance.md'
- 'Supply Chain and Software Acquisition':
- 'Supply Chain and Software Acquisition': '08-Supply-Chain-Software-Acquisition/01-Supply-Chain-and-Software-Acquisition.md'
- 'Terms': '09-Terms/Terms.md'
- 'Outline': '10-Outline/Outline.md'
theme:
name: material
language: "en"
palette:
# Light mode
- media: "(prefers-color-scheme: light)"
scheme: default
primary: blue
accent: indigo
toggle:
icon: material/toggle-switch-off-outline
name: Switch to dark mode
# Dark mode
- media: "(prefers-color-scheme: dark)"
scheme: slate
primary: blue
accent: deep purple
toggle:
icon: material/toggle-switch
name: Switch to light mode
font:
text: Barlow
code: Roboto Mono
docs_dir: notes
markdown_extensions:
- mdx_truly_sane_lists